Duc Nguyen, Minh-Thai Tran & Bac Le. (2023) A new algorithm using integer programming relaxation for privacy-preserving in utility mining. Applied Intelligence 53:21, pages 25106-25118.
Crossref
Mohamed Ashraf, Sherine Rady, Tamer Abdelkader & Tarek F. Gharib. (2023) Efficient privacy preserving algorithms for hiding sensitive high utility itemsets. Computers & Security 132, pages 103360.
Crossref
Mohamed Ashraf, Sherine Rady, Tamer Abdelkader & Tarek F. Gharib. 2023. Proceedings of the 8th International Conference on Advanced Intelligent Systems and Informatics 2022. Proceedings of the 8th International Conference on Advanced Intelligent Systems and Informatics 2022
381
394
.
Bac Le, Tin Truong, Hai Duong, Philippe Fournier-Viger & Hamido Fujita. (2022) H-FHAUI: Hiding frequent high average utility itemsets. Information Sciences 611, pages 408-431.
Crossref
Shalini Jangra & Durga Toshniwal. (2022) Efficient algorithms for victim item selection in privacy-preserving utility mining. Future Generation Computer Systems 128, pages 219-234.
Crossref
Ut Huynh, Bac Le, Duy-Tai Dinh & Hamido Fujita. (2022) Multi-core parallel algorithms for hiding high-utility sequential patterns. Knowledge-Based Systems 237, pages 107793.
Crossref
B. Santhosh Kumar, S. Karthik & R. Cristin. (2021) Certain Inverstigations on Privacy-Preserving Data Mining Using Three-Dimensional Spin Revolution (3DSR) Scheme. Journal of The Institution of Engineers (India): Series B 102:2, pages 387-402.
Crossref
Xuan Liu, Genlang Chen, Shiting Wen & Guanghui Song. (2020) An Improved Sanitization Algorithm in Privacy-Preserving Utility Mining. Mathematical Problems in Engineering 2020, pages 1-14.
Crossref
Xuan Liu, Shiting Wen & Wanli Zuo. (2019) Effective sanitization approaches to protect sensitive knowledge in high-utility itemset mining. Applied Intelligence 50:1, pages 169-191.
Crossref
Felix Zhan. (2019) How to Optimize Social Network Influence. How to Optimize Social Network Influence.
Shaoxin Li, Nankun Mu, Junqing Le & Xiaofeng Liao. (2019) A novel algorithm for privacy preserving utility mining based on integer linear programming. Engineering Applications of Artificial Intelligence 81, pages 300-312.
Crossref
Wensheng Gan, Chun-Wei Lin, Philippe Fournier-Viger, Han-Chieh Chao, Vincent Tseng & Philip Yu. (2019) A Survey of Utility-Oriented Pattern Mining. IEEE Transactions on Knowledge and Data Engineering, pages 1-1.
Crossref
Duy-Tai Dinh, Van-Nam Huynh, Bac Le, Philippe Fournier-Viger, Ut Huynh & Quang-Minh Nguyen. 2019. High-Utility Pattern Mining. High-Utility Pattern Mining
207
232
.
Wensheng Gan, Jerry Chun-Wei, Han-Chieh Chao, Shyue-Liang Wang & Philip S. Yu. (2018) Privacy Preserving Utility Mining: A Survey. Privacy Preserving Utility Mining: A Survey.
Jerry Chun-Wei Lin, Philippe Fournier-Viger, Lintai Wu, Wensheng Gan, Youcef Djenouri & Ji Zhang. (2018) PPSF: An Open-Source Privacy-Preserving and Security Mining Framework. PPSF: An Open-Source Privacy-Preserving and Security Mining Framework.
Vy Huynh Trieu, Chau Truong Ngoc, Hai Le Quoc & Nguyen Nguyen Si. (2018) Algorithm for Hiding High Utility Sensitive Association Rule Based on Intersection Lattice. Algorithm for Hiding High Utility Sensitive Association Rule Based on Intersection Lattice.
Carter Chiu & Justin Zhan. (2018) Deep Learning for Link Prediction in Dynamic Networks Using Weak Estimators. IEEE Access 6, pages 35937-35945.
Crossref